CVE-2025-30358: Mesop Class Pollution vulnerability leads to DoS and Jailbreak attacks
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.61607%
CWE
Published
3/27/2025
Updated
3/27/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mesop | pip | < 0.14.1 | 0.14.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsafe processing of JSON input in dataclass update functions. The key vulnerable function is _recursive_update_dataclass_from_json_obj which lacked dunder property validation before the patch, as shown by the added check in the diff. This function is called by update_dataclass_from_json, which would appear in stack traces during exploitation. The test case confirms these functions are the attack vector by demonstrating pollution attempts through update_dataclass_from_json.